Abstract
Several of the outsourcing endeavors of today will gradually converge to a hybrid outsourcing model that will involve a team spread across three or more strategically-located centers interconnected by Internet technology. White-collar professionals in the US, Australia, and Poland, for example, could each work on a standard 9--5 basis, transfer the activity to a colleague in the next center, thereby enabling work to be performed on a round-the-clock basis. The effective use of sequential workers in such a 24-hour knowledge factory requires that professional tasks be broken down to the level where individuals can work on them with minimal interaction with their peers, and where new approaches can be employed to reduce the effort involved in transitioning from one employee to the next. This article describes an Internet-based prototype system that uses a Web-based interactive approach, coupled with a unique data model, to optimize collection and storage of design rationale and history from stakeholders and workers. The idea of multiple individuals acting as one “composite persona” is explored in the context of facilitating tasks and knowledge to be shared across the Internet in a seamless manner. The article also describes related activities in the commercial arena.
- Aron, R. and Singh, J. 2004. IT enabled strategic outsourcing: Knowledge intensive firms, information work and the extended organizational form. Tech. Rep., The Wharton School, University of Pennsylvania.Google Scholar
- Bartmess, A. and Cerny, K. Winter 1993. Building competitive advantage through a global network of competencies. CA. Manag. Rev. 78--103.Google Scholar
- Battin, R. D., Crocker, R., Kreidler, J., and Subramanian, K. 2001. Leveraging resources in global software development. IEEE Software. Google Scholar
Digital Library
- Beck, K. 2000. Extreme Programming Explained: Embrace Change. Addison Wesley. Google Scholar
Digital Library
- Berger, S. 2005. How We Compete. DoubleDay.Google Scholar
- Blaxill, M. and Hout, T. 1991. The fallacy of the overhead quick fix. Harv. Bus. Rev., 93--101.Google Scholar
- Bohanec, M. and Zupan, B. 2004. A function-decomposition method for development of hierarchical decision models. Decis. Sup. Syst. 36, 3, 215--233. Google Scholar
Digital Library
- Boneh, D., Ding, X., and Tsudik, G. 2004. Fine-grained control of security capabilities. ACM Trans. Inter. Tech. 4, 1, 60--82. Google Scholar
Digital Library
- Brice, A. and Johns, B. 1998. Improving process design by improving the design process. A DRAMA White Paper. QuantiSci.Google Scholar
- Carmel, E. and Agarwal, R. 2002. The maturation of offshore sourcing of information technology work. MIS Quart. Exec.Google Scholar
- Cederqvist, P. et al. 2005. Version Management with CVS for CVS 1.12.12. Free Software Foundation, Inc.Google Scholar
- Champy, J. 2003. Is technology delivering on its productivity promise? Finan. Exec., 34--39.Google Scholar
- Chaczko, Z., Klempous, R., Nikodem, J., and Rozenblit, J. 2006. 24/7 Software development in virtual student exchange groups: Redefining the work and study week. ITHET 7th Annual International Conference. Sydney, Australia.Google Scholar
- Denny, N. 2006. The nexus of entrepreneurship and technology (NEXT) initiative tech. Rep. # 20060810, Eller College of Management, University of Arizona.Google Scholar
- Diffie, W. and Hellman, M. E. 1976. New Directions in Cryptography. IEEE Trans. Info. Theorm, 644--654.Google Scholar
Digital Library
- Evaristo, R. J. and Scudder, R. 2000. Distributed project teams: A dimensional analysis. In Proceedings of the 33rd Hawaii International Conference on System Sciences. Geographically, 1--11. Google Scholar
Digital Library
- Fertig, S., Freeman, E., and Gelernter, D. 1996. Lifestreams: an alternative to desktop metaphor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 410--411. Google Scholar
Digital Library
- Funk, J. L. 1997. Concurrent engineering and the underlying structure of the design problem. IEEE Trans. Engin. Manage. 44, 3, 305--315.Google Scholar
Cross Ref
- Fielding, R., Gettys, J., Mogul, J., Frystyk, H., and Berners-Lee, T. 1997. Hypertext Transfer Protocol---HTTP1.1. RFC 2068, Internet Engineering Task Force. Google Scholar
Digital Library
- Gao, J. Z., Chen, C., Toyoshimo, Y., and Leung, D. K. 1999. Engineering on the Internet for global software production. IEEE Comput. 33, 10, 38--47. Google Scholar
Digital Library
- Grune, D. 1986. Concurrent versions system, a method for independent cooperation. The Netherlands. Tech. Rep. IR 113. Vrije Universiteit. Amsterdam, 9.Google Scholar
- Gupta, A. 2001. A four-faceted knowledge based approach to surmounting national and other borders. J. Knowl. Manag. 5, 4.Google Scholar
Cross Ref
- Gupta, A., Denny, N., and Seshasai-Eds, S. 2007. Special issue on offshoring and outsourcing. J Electr. Commer. Organiz. 5, 2.Google Scholar
Cross Ref
- Hickman, K. 1995. The SSL Protocol. Netscape Communications Corp.Google Scholar
- Hill, C., Yates, R., Jones, C., and Kogan, S. 2006. Beyond predictable workflows: Enhancing productivity in artful business processes. IBM Syst. J. 45, (4). Google Scholar
Digital Library
- Humphrey, W. S. 1995. Introducing the personal software process. Ann. Softw. Engin. 1.Google Scholar
- Kaptelinin. 2003. UMEA: Translating interaction histories into project contents. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 353--360. Google Scholar
Digital Library
- Keller, K. R., Schauer, R., Robitaille, S., and Page, P. 1999. Pattern-based reverse-engineering of design components. In Proceedings of the IEEE 21st International Conference on Software Engineering. 226--235. Google Scholar
Digital Library
- Klensin, J. 2001. Simple mail transfer protocol. RFC 2821. Google Scholar
Digital Library
- Lacity, M., Willcocks, D., and Feeny, D. 1995. IT outsourcing: maximize flexibility and control. Harv. Busi. Rev. 84--93.Google Scholar
- Lei, D. and Slocum, J. 1992. Global strategy, competence building and strategic alliances. CA. Manage. Rev. 81--97.Google Scholar
- MacCormack, A., Newman, L., and Rosenfeld, D. 1994. The new dynamics of global manufacturing site location. Sloan Manag. Rev. 69--80.Google Scholar
- Mitra, A. and Gupta, A. 2006. Agile Systems with Reusable Patterns of Business Knowledge a Component Based Approach. Artech House Press. Google Scholar
Digital Library
- Myers, J. and Rose, M. 1996. Post Office Protocol---Version 3, STD 53, RFC 1939. Google Scholar
Digital Library
- National Institute of Science and Technology. FIPS PUB 180-2, 2002. Secure Hash Standard (SHS).Google Scholar
- National Institute of Science and Technology. FIPS PUB 197, 2001. Advanced Encryption Standard (AES).Google Scholar
- National Institute of Standards and Technology. FIPS PUBS 46-3, 1999. Data encryption standard (DES).Google Scholar
- Orlikowski, W. and Yates, J. 2002. It's about time: temporal structuring in organizations. Organiz. Sci. 13, 6. 684--700. Google Scholar
Digital Library
- Pena-Mora, F., Sriram, R., and Logcher, R. 1995. Conflict mitigation system for collaborative engineering. In Artificial Intelligence in Engineering Design, Analysis and Manufacturing. 101--124.Google Scholar
- Pisano, G. and Wheelwright, S. 1995. The new logic of high tech R&D. Harv. Bus. Rev. 93--105.Google Scholar
- Powell, W. 1998. Learning from collaboration: Knowledge and networks in the biotechnology and pharmaceutical industries. CA. Manag. Rev., 228--240.Google Scholar
- QuestMap 2000 v3.12 The Soft Bicycle Company.Google Scholar
- Quinn, J. 1999. Strategic outsourcing---leveraging knowledge capabilities. Sloan Manag. Rev.Google Scholar
- Rekimoto, J. 1999. TimeScape: A time machine for desktop environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 45--54. Google Scholar
Digital Library
- Sambamurthy, V., Bharadwhaj, A., and Grover, V. 2003. Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms. MIS Quar. 27, 2, 237--263.Google Scholar
Digital Library
- Seitz, M. and Peattie, K. 2004. Meeting the closed-loop challenge. CA. Manag. Rev. 74--89.Google Scholar
- Seshasai, S. and Gupta, A. 2004. A knowledge-based approach to engineering design. AIAA J. Spacecrafts Rockets, 41, 1.Google Scholar
- Stallings, W. 2000. Cryptography and Network Security: Principles and Practice, 4th Ed. (Chapters 1 to 13, and 16). Prentice Hall. Google Scholar
Digital Library
- Seshu, R. and Denny, N. 2007. The nexus of entrepreneurship and technology (NEXT) initiative tech. rep. # 20070220, Eller College of Management, University of Arizona.Google Scholar
- Schwaber, K. and Beedle, M. 2002. Agile Software Development with Scrum. (Series in agile software development.) Upper Saddle: Prentice Hall. Google Scholar
Digital Library
- Sriram, D., Logcher, R. D., Groleau, N., and Cherneff, J. 1992. DICE: Object oriented programming environment for cooperative engineering design. In Artificial Intelligence in Engineering Design (Vol. III): Knowledge Acquisition, Commercial Systems, and Integrated Environments. Academic Press, San Diego, CA. 303--366. Google Scholar
Digital Library
- Tan, G., Hayes, C., and Shaw, M. 1991. An Intelligent agent framework for concurrent product design and planning. IEEE Trans. Engin. Manag. 43, 3.Google Scholar
- Tridgell, A. 2000. The RSYNC algorithm. Ottawa Linux Symposium, Canada.Google Scholar
- Wharton. 2005. How some BPO providers seek to build and protect their turf. knowledge. Wharton Research Report.Google Scholar
- Wharton. 2006. Realizing the Indian dream. 11th Wharton India Economic Forum.Google Scholar
- Whitehead, E. J. 1997. World Wide Web distributed authoring and versioning (WebDAV): An introduction. StandardView 5, 1, 3--8. Google Scholar
Digital Library
- Wu, J., Doong, H., Lee, C., Hisa, T., and Liang, T. 2004. A methodology for designing form-based decision support systems. Decis. Supp. Syst. 36, 3, 313--335. Google Scholar
Digital Library
- Yap, M. 2005. Follow the sun: Distributed extreme programming development. Agile Development Conference (ADC'05). 218--224. Google Scholar
Digital Library
Index Terms
24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations
Recommendations
Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts
The existing research literature suggests that six main factors influence the collaborative behavior of workers. Collaborative behavior has a crucial impact on the thriving of an organization and its human capital, being a necessary condition for ...
Knowledge transfer and utilization in IT outsourcing partnerships: A preliminary model of antecedents and outcomes
We developed a nomological network of antecedents and outcomes of knowledge transfer and utilization in IT outsourcing relationships, and tested it using a survey of 146 IT outsourcing partnerships in Singapore. Our findings showed that the ...
Knowledge Sharing Model for Competitive Ecosystem on Gig Economy
SPBPU IDE '19: Proceedings of the 2019 International SPBPU Scientific Conference on Innovations in Digital EconomyDigital business with gig economy scheme had no culture to share knowledge since strictly competition among gig workers. It affects gig workers' limited ability and knowledge to accomplish projects and reduce their performance. This study proposed a ...






Comments